Business operations/infrastructure damage
Business operations/infrastructure damage - Damage, disruption, or destruction of a business system and/or its components due to malfunction, cyberattacks, etc.
ENTITY
3 - Other
INTENT
3 - Other
TIMING
2 - Post-deployment
Risk ID
mit954
Domain lineage
4. Malicious Actors & Misuse
4.2 > Cyberattacks, weapon development or use, and mass harm
Mitigation strategy
1. Formalize and rigorously exercise a Disaster Recovery Plan (DRP) focused on business continuity, ensuring regular, encrypted, and isolated offsite backups of critical data and configurations to enable rapid system reconstitution following an infrastructure compromise 2. Implement a Zero-Trust architecture by employing network segmentation to isolate critical systems and enforce multi-factor authentication (MFA) and the principle of least privilege (PoLP) for all user accounts, thereby limiting lateral movement and mitigating unauthorized access 3. Establish a continuous security monitoring and response capability, utilizing advanced tools such as Endpoint Detection and Response (EDR) and Intrusion Detection Systems (IDS) to proactively detect, contain, and remove malicious activity within the operational environment